Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Petya Ransomware Spreads via Fake Online Resumes

b2ap3_thumbnail_ransomware_petya_400.jpgNext time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya.

Petya is a particularly mean-spirited ransomware that hackers use to extort money from their victims. Infection begins with a Windows error, followed by the typical “blue screen of death” reboot, and displays a red skull and crossbones. As the computer restarts, a fraudulent “system check” allows the infection to encrypt the master file table (MFT), so the computer more or less “forgets” where, or even which, files it has.

In addition to doing this, instead of barring access from particular files, Petya locks the user out of their system entirely by overwriting their computer’s master boot record. Once this happens, the computer is rendered useless (you can’t even log in), only displaying a list of demands, an online address to appease those demands in Bitcoin, and finally, a decryption code to regain access to the files.

When the user accesses the payment page, they learn that they have a limited amount of time to purchase their key before the price is doubled--from around an initial cost of .99 Bitcoins, which is equivalent to about $430. While many websites claim that there are commands that will allow the user to skip the lock screen, the MFT will still be encrypted, and the files still useless. Additionally, there’s no guarantee that the decryption key provided upon payment will even solve the problem, potentially leaving the user short $430 and all of their digital files.

Business owners and human resource representatives need to be particularly alert, considering that the preferred method of dispersement for Petya is via email, specifically disguised as what would appear to be a message from someone seeking a job. The message contains a hyperlink that directs to a Dropbox containing a “resume” (an antivirus program-blinding Trojan containing Petya) and a stock photo. With these tactics, Petya had been plaguing German businesses, with no telling when it may spread.

Fortunately, a programmer has come up with a fix to remove Petya without paying any ransom after his father-in-law’s system was targeted. Thanks to some purported carelessness by the authors of this malware, the encryption is crackable. To do so, however, isn’t such a simple task - it requires a second, uninfected hard drive, for starters. So while Petya has been cracked, it is still better to not be a target in the first place.

So how does one avoid such an attack? Mainly vigilance, assisted by Total Tech Care’s security solutions that help detect and block questionable sources. Call 866-348-2602 for more information about products to keep your company safe from the cyber pirates flying a digital skull and bones.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Windows Phishing Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Server Save Money Cloud Computing Office Windows 10 Passwords Gadgets Chrome Virtualization Tech Term Social Media Saving Money Holiday Managed IT Services Microsoft Office Managed Service Automation Cybercrime Operating System Artificial Intelligence Computers Facebook Health Networking IT Support Internet of Things Hacking Wi-Fi BYOD Mobile Device Management Managed Service Provider Spam Alert Information Office 365 Remote Telephone Systems Information Technology Covid-19 Bandwidth BDR Social Engineering Mobility Recovery Employer-Employee Relationship Router Human Resources Law Enforcement Big Data Remote Monitoring Password Money App History Mobile Computing Encryption Applications Application Data Breach Government Remote Computing Blockchain Private Cloud Paperless Office Mobile Office How To Managed IT Apps Data Storage Office Tips Patch Management Training VPN Avoiding Downtime Two-factor Authentication Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Flexibility Voice over Internet Protocol Marketing Wireless WiFi Vulnerability Windows 7 IT solutions Word Entertainment Website Gmail Budget Google Drive Settings Servers Employee/Employer Relationship Virtual Reality RMM Apple Social Telephone System Staff Software as a Service Save Time User Error Machine Learning Meetings Connectivity Remote Work Cleaning Risk Management Hacker Conferencing End of Support The Internet of Things Vendor Education Physical Security Scam Lithium-ion battery Safety Managed Services Display Data Protection HIPAA USB Sports Redundancy Keyboard Firewall Vendor Management CES Hard Drive Unsupported Software Best Practice SaaS Humor YouTube Charger Black Market Content Management Business Technology Access Control Compliance Computing OneNote Computer Care Virtual Assistant Network Congestion Current Events Document Management Telephony eWaste Authentication Wireless Technology Samsung Solid State Drive How to Downtime Digital Signage Value Data storage Update Automobile Wearable Technology Spam Blocking Electronic Medical Records Hard Drives Retail Virus Instant Messaging Google Docs Procurement Net Neutrality Computing Infrastructure Robot Workplace Strategy Hiring/Firing Identity Theft Excel Going Green Unified Threat Management Help Desk Computer Accessories Biometrics Printing Virtual Desktop Battery Augmented Reality DDoS Shadow IT Fraud Managed Services Provider Legal Business Intelligence Remote Worker SharePoint Printer Database Bluetooth Audit Internet Exlporer Worker IT Management Cryptocurrency Remote Workers Botnet PDF Customer Service Environment Processor IT Plan Comparison IT Consultant Fax Server Proactive IT IT service IBM Peripheral Video Games File Sharing Worker Commute Flash Camera Inventory Digital Security Cameras Smart Technology Specifications Using Data Tablet Copiers 5G Experience Wire Evernote Domains Supercomputer Quick Tip Travel Scalability Software Tips Smartwatch Business Owner Sync Printers Emails Ergonomics Millennials Development OLED IaaS Smart Office Maintenance NarrowBand Wireless Charging Search Consultant Bloatware PCI DSS Virtual Machine Employee Virtual Private Network iPhone Netflix Analytics 2FA Two Factor Authentication Workforce Fiber Optics Cables Tablets Messaging Cabling Root Cause Analysis HBO Best Available Knowledge Entrepreneur Policy Music Hypervisor Skype Project Management WIndows 7 Files Nanotechnology Dark mode Telecommuting Trend Micro Chromecast Cortana SMS Default App Data loss Shortcut Outlook Leadership Digital Signature Cost Management Procedure Troubleshooting Saving Time Google Search Start Menu Warranty Colocation Social Networking dark theme Uninterrupted Power Supply Shopping Loyalty Google Apps AI IT Infrastructure Screen Mirroring HVAC Frequently Asked Questions Monitor Analysis FinTech Books Bing Social Network Mobile Administrator User Running Cable Windows 10s Devices PowerPoint Windows Media Player Memory Investment Cast Enterprise Content Management Tip of the week MSP Reputation webinar Accountants Employees Streaming Media Emergency Employee/Employer Relationships ISP Content Professional Services Microchip Managing Stress Public Cloud Thought Leadership Windows 365 Tech Support Employer Employee Relationship Credit Cards Laptop Assessment Password Manager Video Conferencing ROI Techology Password Management Shortcuts Windows Server 2008 Customers Cameras Sales Multi-Factor Security Bitcoin Personal Cryptomining Audiobook Tools Search Engine Twitter Point of Sale Science Touchpad Television Business Mangement Supply Chain Management NIST Smart Tech Monitoring Trending Batteries Digitize Politics Distributed Denial of Service Advertising Addiction Customer Relationship Management Windows 8.1 Amazon Public Computer Recycling Analyitcs Windows Server 2008 R2 Regulations Wiring Practices Printer Server Programming Customer relationships Notifications Transportation IT Assessment Manufacturing Computer Fan Cache Email Best Practices Rootkit Amazon Web Services Criminal Safe Mode Security Cameras GDPR Antivirus Relocation Workers Hosted Computing Computer Tips Benefits Managed IT Service Windows 8 OneDrive Biometric Security FENG Wireless Internet Virtual CIO Online Shopping

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code